Network Defense Architect

  • Home
  • Network Defense Architect
Network Defense Architect

Course Description

Certified Network Defender (CND) is a vendor-neutral, hands-on, instructor-led comprehensive network security certification training program. It is a skills-based, lab intensive program based on a job-task analysis and cybersecurity education framework presented by the National Initiative of Cybersecurity Education (NICE). The course has also been mapped to global job roles and responsibilities and the Department of Defense (DoD) job roles for system/network administrators. The course is designed and developed after extensive market research and surveys.

The program prepares network administrators on network security technologies and operations to attain Defense-in-Depth network security preparedness. It covers the protect, detect and respond approach to network security. The course contains hands-on labs, based on major network security tools and techniques which will provide network administrators real world expertise on current network security technologies and operations. The study-kit provides you with over 10 GB of network security best practices, assessments and protection tools. The kit also contains templates for various network policies and a large number of white papers for additional learning.

image

Training Modules

Module 01: Computer Network and Defense Fundamentals.

Module 02: Network Security Threats, Vulnerabilities, and Attacks.

Module 03: Network Security Controls, Protocols, and Devices.

Module 04: Network Security Policy Design and Implementation.

Module 05: Physical Security.

Module 06: Host Security.

Module 07: Secure Firewall Configuration and Management.

Module 08: Secure IDS Configuration and Management.

Module 09: Secure VPN Configuration and Management.

Module 10: Wireless Network Defense.

Module 11: Network Traffic Monitoring and Analysis.

Module 12: Network Risk and Vulnerability Management.

Module 13: Data Backup and Recovery.

Module 14: Network Incident Response and Management.

image

About the Exam and Certification

Examination

Exam title: CND
Exam code: 312-38
Number of questions: 100
Duration: 4 Hours
Availability: ECC Exam
Test Format: Interactive Multiple Choice Questions

Passing Score

In order to maintain the high integrity of our certifications exams, EC-Council Exams are provided in multiple forms (I.e. different question banks). Each form is carefully analyzed through beta testing with an appropriate sample group under the purview of a committee of subject matter experts that ensure that each of our exams not only has academic rigor but also has “real world” applicability. We also have a process to determine the difficulty rating of each question. The individual rating then contributes to an overall “Cut Score” for each exam form. To ensure each form has equal assessment standards, cut scores are set on a “per exam form” basis. Depending on which exam form is challenged, cut scores can range from 60% to 85%.

The Purpose of the CND is to:

Students enrolled in the Certified Network Defender course, will gain a detailed understanding and hands on ability to function in real life situations involving network defense. They will gain the technical depth required to actively design a secure network in your organization. This program will be akin to learning math instead of just using a calculator. This course gives you the fundamental understanding of the true construct of data transfer, network technologies, software technologies so that you understand how networks operate, understand what software is automating and how to analyze the subject material.

You will learn how to protect, detect and respond to the network attacks. You will learn network defense fundamentals, the application of network security controls, protocols, perimeter appliances, secure IDS, VPN and firewall configuration. You will then learn the intricacies of network traffic signature, analysis and vulnerability scanning which will help you when you design greater network security policies and successful incident response plans. These skills will help you foster resiliency and continuity of operations during attacks.